WO2023009489A1 - Systèmes de décision et de surveillance dynamiques cyber-sécurisés - Google Patents

Systèmes de décision et de surveillance dynamiques cyber-sécurisés Download PDF

Info

Publication number
WO2023009489A1
WO2023009489A1 PCT/US2022/038296 US2022038296W WO2023009489A1 WO 2023009489 A1 WO2023009489 A1 WO 2023009489A1 US 2022038296 W US2022038296 W US 2022038296W WO 2023009489 A1 WO2023009489 A1 WO 2023009489A1
Authority
WO
WIPO (PCT)
Prior art keywords
power
subsystem
cyber
characteristic
interaction variable
Prior art date
Application number
PCT/US2022/038296
Other languages
English (en)
Inventor
Marija Ilic
Original Assignee
Massachusetts Institute Of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Massachusetts Institute Of Technology filed Critical Massachusetts Institute Of Technology
Publication of WO2023009489A1 publication Critical patent/WO2023009489A1/fr

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00004Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the power network being locally controlled
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • Modern power system and subsystems include not only grid-level power applications, but also more localized applications such as localized subsystems, microgrids, and the like. These subsystems may manage and provide power to a relatively localized area such as a town, a campus, a factory or group of factories, a home, etc.
  • Such subsystems may include power sources including, but not limited to traditional power plants (e.g., coal fire or nuclear power plants), solar farms and panels, wind farms and turbines, generators. Power subsystems may also include various types of loads such as residential domiciles, factories, electric vehicles, and the like. In addition, these power subsystems may also include power storage devices (also sometimes referred to herein as storage elements) such as batteries. Other elements and circuits may be present within the subsystem such as power switches, power converters, power buses, and the like. All these elements may interact within the subsystem to create a localized power ecosystem or “grid” that provides energy to energy consumer (i.e. loads) within the subsystem.
  • power sources including, but not limited to traditional power plants (e.g., coal fire or nuclear power plants), solar farms and panels, wind farms and turbines, generators.
  • Power subsystems may also include various types of loads such as residential domiciles, factories, electric vehicles, and the like.
  • these power subsystems may also include power storage devices (also sometimes referred
  • Many subsystems include computerized management systems that monitor and/or control the power sources, loads, storage elements (e.g., batteries), and other elements.
  • These management systems can be susceptible to cyber-attacks, i.e. attacks by “hackers” (i.e., an organization or person who utilizes processing or other devices (e.g., computers) to gain unauthorized access to systems, data, and/or operations of a system) or other parties intending to interrupt, disrupt or otherwise interfere with or change in some way operation of a management system or a subsystem.
  • Detecting cyber-attacks can afford a person, system or organization under attack to defend against the cyber-attack.
  • a cyber-attack may be directed toward information regarding a tie line exchange or frequency input to an automatic generation control (AGC).
  • AGC automatic generation control
  • an AGC is a system for adjusting the power output of multiple generators at different power plants, in response to changes in the load.
  • One AGC function is to automatically control power generation in response to slow, hard-to-predict area control imbalances.
  • Each control area may have its own AGC system, with the task of regulating local area frequency to nominal value (60 Hz in USA, for example), and the exchange of power with the neighboring areas.
  • the net power imbalance between neighboring areas is represented as the Area Control Error (ACE).
  • ACE Area Control Error
  • a system includes an interface that provides an output signal; a controller configured to calculate an interaction variable from a function of one or more internal states of the system; a comparator circuit coupled to receive the output signal and the interaction variable, to determine a difference between at least one characteristic of the power signal and at least one characteristic of the interaction variable; and a cyber-attack identification module configured to identify the presence of a cyber-attack targeting the system based on the difference between the at least one characteristic of the power signal and the at least one characteristic of the interaction variable.
  • Implementations may include one or more of the following features.
  • the system may be a microgrid.
  • the output signal is a power output signal of the microgrid.
  • the microgrid is a hierarchical microgrid.
  • the interaction variable is a function that includes a rate of change of reactive power of the output signal.
  • the interaction variable is a function of internal states of the system.
  • the internal states may include: an amount of power generated by the system, an amount of power provided as an output of the system, an amount of power received from other systems, a change in a power level of the system, or any combination thereof.
  • the cyber attack identification module calculates a threshold of the difference, and compares the difference to the threshold.
  • the system includes one or more power source elements and one or more load elements.
  • the system may include at least one measurement circuit to measure a state of the one or more power source elements and/or the one or more load elements.
  • a method of detecting a cyberattack of a system includes providing, by the system, an output signal; measuring one or more internal states of the system; calculating an interaction variable from a function of one or more internal states of the system; determining, by a comparator circuit coupled to receive the output signal and the interaction variable, a difference between at least one characteristic of the power signal and at least one characteristic of the interaction variable; and identifying, by a cyber-attack identification module, the presence of a cyber-attack targeting the system based on the difference between the at least one characteristic of the power signal and the at least one characteristic of the interaction variable.
  • Implementations may include one or more of the following features.
  • the system is a microgrid.
  • the output signal is a power output signal of the microgrid.
  • the microgrid is a hierarchical microgrid.
  • the interaction variable is a function that includes a rate of change of reactive power of the output signal.
  • the interaction variable is a function of internal states of the system.
  • the internal states may include: an amount of power generated by the system, an amount of power provided as an output of the system, an amount of power received from other systems, a change in a power level of the system, or any combination thereof.
  • the cyber attack identification module calculates a threshold of the difference, and compares the difference to the threshold.
  • the system includes one or more power source elements and one or more load elements.
  • the method may include measuring, by at least one measurement circuit, a state of the one or more power source elements and/or the one or more load elements.
  • FIG. 1 is block diagram of an example power system comprising one or more subsystems.
  • FIG. 2 is block diagram of an example power system comprising an aggregator/controller coupled to one or more sources, loads and/or buses.
  • FIG. 3 is a block diagram representation of information processing in emerging microgrids showing their hierarchical control.
  • FIG. 4 is a flow diagram of a process for detecting a cyber attack.
  • FIG. 5 is a block diagram of a system for detecting a cyber attack.
  • FIG. 6 is a model of subsystem.
  • FIG. 7 is a model of an element of a subsystem.
  • subsystems is used herein to refer to electrical power subsystems. It should be appreciated that this term may include various types of subsystems such as power grids, power grid subsystems, microgrids, building-level power systems, or any other type of power system with power generating elements, power consuming elements, and/or power storage elements. In some instances, subsystems will include computerized monitoring or control of some or all the elements within the subsystem. For example, a computing system may monitor and control power sources within the subsystem by measuring voltage and current outputs of the power source and throttling the electrical output of the power source.
  • the computing system may also monitor and control power consumer (a.k.a. loads) by measuring the current into and voltage across the load, and turning the loads on and off and/or throttling the amount of power the load consumes.
  • the computing system may also monitor and control batteries within the subsystem by measuring the stored energy within the battery and controlling the charging and discharging of the battery.
  • Subsystems with emerging functionalities may require cyber-physical control for their lead services. These subsystems can participate in economic dispatch to predict usage and balance ancillary services. Cyber-attacks can compromise the subsystem and potentially cause significant operational problems.
  • a subsystem 100 is coupled to a central power grid 102.
  • the subsystem 100 may include various power sources 102 which may include any elements that generate power within the subsystem 100. Examples of sources 102 include, but are not limited to, power generators, power plants, solar farms, wind farms, storage devices and the like.
  • the power sources 102 may also include one or more solar panels on buildings.
  • the subsystem 100 may also include various loads 104, which may include any element that consumes power such as buildings, factories, residential homes, and the like as well as any power consuming machines therein.
  • loads 104 may also include loads within buildings and structures such as heating systems, hot water heaters, air conditioning systems, and the like.
  • Subsystem 100 may also include elements that can act as both electrical sources and loads, such as storage devices (e.g., batteries).
  • One or more loads 104 may be critical loads, which may be loads where power must not be interrupted. Examples of critical loads include hospitals and other facilities where the loss of power can be dangerous.
  • Subsystem 104 may also comprise one or more priority loads and/or one or more interruptible loads. Priority loads are loads where it is desirable to provide continuous power, and interruptible loads are loads where temporary loss of power may be acceptable.
  • the subsystem also includes infrastructure 106, which may comprise power lines, switches, buses, transformers, communication lines, and other electrical circuits and interconnections that allow the sources 102 and loads 104 to interact, provide/consume power, and communicate with each other.
  • the infrastructure 106 may include a computer network (wired or wireless) that allows communication between some or all of the elements within the subsystem 100.
  • the infrastructure 106 may include a controller 108 coupled to one, some, or all the sources 102, loads 104, infrastructure 106 elements, or any other element within subsystem 100.
  • controller 108 may be a computing device that includes a processor and a memory.
  • the processor may execute software instructions stored on the memory, which may cause the processor to perform various functions. These functions may include operational functions of the subsystem such as controlling any or all the loads 104, sources 102, infrastructure elements, or storage devices.
  • the functions may also include any or all the functions described below relating to detection of a cyber attack including, but not limited to, measuring or computing interaction variables (IntVars), comparing IntVars to detect a cyber attack, and the like.
  • IntVars measuring or computing interaction variables
  • Controller 108 may be a single computing device 108 or a plurality of computing devices. Controller 108 may be collocated with subsystem 100, or may be located at a remote location as long as controller 108 can communicate with one or more of the element(s) within subsystem 100.
  • Subsystem 100 may be coupled to a central grid 110, such as a national or regional power grid. Similarly, subsystem 100 may be coupled to one or more other subsystems 112. In some instances, there may be power exchange between subsystem 100 and central grid 110. However, in other instances, subsystem 100 may operate independently, supplying and consuming its own power without the need for power exchange with other grids.
  • subsystem 200 may be the same as or similar to subsystem 100.
  • Subsystem 200 is shown with various points of contact 202, 204, 206, 208. These points of contact 202-208 may act as electrical buses that can function as interconnects for various loads and sources within or external to subsystem 200.
  • point of contact 206 may be coupled to loads 210 and 212, and coupled to source 214 which may provide power to loads 21 and 212.
  • Point of contact 206 may also provide an external interface point to subsystem 200, which may be coupled to a central grid, another subsystem 218, or the like.
  • subsystem 200 may have multiple external interfaces that exchange power with multiple other subsystems.
  • a controller 216 may be coupled to one, some, or all the elements within subsystem 200. Controller 216 may monitor and/or control the infrastructure elements, providing power to critical loads, priority loads, and interruptible loads as needed. Controller 216 may also measure or otherwise determine or receive the state of each element within subsystem 200 and use one, some or all of the element states to generate an aggregated IntVar calculation, which will be discussed below.
  • An IntVar of subsystem 200 may be represented as the power exerted by subsystem 200 on its environment.
  • One way to measure the IntVar is to measure an area control error (ACE), which can be represented as power and the rate of change of the power at the external interfaces (e.g. interface 220) of subsystem 200. If the subsystem has more than one external interface (i.e. more than one point of contact that exchanges power external to subsystem 200), then the IntVar for subsystem 200 can be measured by measuring the power exchange (e.g. the power input or output, and/or the rate of change of the power input or output) at each interface and summing them.
  • ACE area control error
  • Another way to measure the IntVar of subsystem 200 is to calculate, computer, receive or otherwise determine the internal states of subsystem 200. This may be accomplished, for example, by measuring the power and the rate of change of power of every element (i.e., loads, sources, power storage elements, etc.) within subsystem 200 and aggregating them.
  • the IntVar can be calculated or otherwise determined as a function of the internal states of the subsystem, and can be represented as, where x is an internal state of subsystem 200:
  • the IntVar of the subsystem can be viewed as a function of the internal states x and the rate of change of the internal states x of the subsystem /(x, x).
  • equations (1) and (2) in a normally operating subsystem:
  • the left side of equation (3) represents the IntVar measured at the subsystem’s external interfaces.
  • the right side of equation (3) represents the IntVar calculated aggregating the states of the elements within the subsystem. If there is a discrepancy, for example if the two sides of equation (3) do not match, it can indicate the presence of a cyber-attack that is affecting the power generated and/or consumed by the subsystem.
  • a threshold value T (e.g., a determined value, or an arbitrarily selected threshold value T) may be established, such that if: then a cyber-attack is detected.
  • a threshold value may be determined based upon historical data associated with one or more systems and/or subsystems.
  • controller 216 may be coupled to each element within subsystem 200 and can measure the power input and output of each element. Additionally or alternatively, controller 200 may receive communications about the state of each element within subsystem 200. For example, controller 216 may receive a network communication from an element such as a smart water heater within subsystem 200 providing information about the power consumption of the smart water heater. Controller 216 may then be able to calculate and aggregate the IntVar of the subsystem by aggregating the power input and output of each element within the subsystem, per equation (2) above.
  • some subsystems may operate according to a hierarchical control structure 300 having a plurality of levels with here three levels being shown (i.e., primary, secondary and tertiary levels being shown in the example embodiment of Fig. 3).
  • Each of the levels may comprise one or more controllers and/or one or more components.
  • decisions are made and scales of complexity differ at the primary, secondary and tertiary levels.
  • the one or more controllers in the bottom level (identified as Row C in Fig.
  • 3) may represent one or more controllers coupled to one or more individual elements within a subsystem, such as a controller coupled to one or more of: an individual load such as a smart water heater or electric car; to an individual source such as generator; and/or to an individual storage device, or the like.
  • the one or more controllers in Row B may represent controllers that operate a subsystem, such as controller 216 in FIG. 2.
  • the controllers in rows B and C may communicate with each other, providing and/or exchanging information (for example over a communication network) about the state of the subsystem and/or the state of the elements within the subsystem.
  • a tertiary level controller in row A may communicate with multiple subsystem- level controllers in row B.
  • the tertiary controller in row B may provide and/or exchange information about the amount of power that is being exchanged between subsystems.
  • the tertiary controller can provide information to controller 216 and/or subsystem 218 about the ACE between subsystems 200 and 218.
  • the boxes labeled component 1 through N may represent energy generating sources including but not limited to entire power plants such as solar plants, nuclear power plants, fusion power plants, storage devices, generators, and the like.
  • FIG. 4 is a flow diagram showing illustrative processing for detecting a cyber attack in a subsystem that can be implemented within any of systems 100 (FIG. 1), 200 (FIG. 2), 300 (FIG. 3) describe above. Some or all of the functions in the flowchart may be performed by a computing device, such as controller 216 (Fig. 2).
  • Rectangular elements represent processing or computer software instructions or groups of instructions.
  • Diamond shaped elements represent processing or computer software instructions, or groups of instructions, which affect the execution of the processing or computer software instructions represented by the processing blocks.
  • the processing and decision blocks may represent functions performed by functionally equivalent circuits such as a digital signal processor circuit or an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • processing begins in processing block 402, internal characteristics (e.g., internal states) of a subsystem are measured or otherwise determined. As described above, in embodiments, the internal states of elements within a subsystem can be measured otherwise determined by or communicated to a controller.
  • internal characteristics e.g., internal states
  • an IntVar for the subsystem is calculated or otherwise determined from the characteristics that were measured in processing block 402.
  • the measured or determined characteristics can be aggregated.
  • the measured or determined characteristics can be aggregated according to equation (2) above.
  • the IntVar of the subsystem can be measured or otherwise determined by measuring or determining the power exchange at the interface(s) of the subsystem. This may be accomplished, for example, according to equation (1) above.
  • the controller may calculate or otherwise determine a difference between the value of the IntVar that was determined in box 406 and the value of the IntVar that was determined in processing block 404. If that difference exceeds a threshold in box 410, then the controller may indicate that a potential cyber attack was detected in processing block 412.
  • measures/processes/actions to counter the cyber-attack can be taken. These measures can include any known cyber-attack counter measures such as shutting off external network communications, closing firewalls, and the like.
  • a system 500 for detecting or otherwise determining a cyber attack includes a controller 502 that may be associated with a subsystem. Controller 502 may be the same as or similar to controller 216.
  • the system may include one or more distributed system state measurements circuits 516a-n. These circuits 516a-n may function or otherwise act to measure or determine the internal state of the subsystem by, for example, measuring the state of the elements of the subsystem.
  • the circuit 516a-n may comprise a power measurement device capable of measuring how much power is being consumed by an individual load within the subsystem, or how much power is being produced by an individual source within the subsystem.
  • the system may also include one or more interface IntVar measurement circuits 518.
  • the circuit 518 may be configured to measure power at the interface of the subsystem to determine a value of the IntVar for the subsystem. For example, circuit 518 may determine (e.g., measure) an ACE between subsystems, the net power exchange of the subsystem at all external interfaces, and/or similar measurements.
  • the circuits 516a-n and 518 may communicate with the controller 512 through a communication interface 514, which may be a wireless or wired network.
  • An IntVar processor module 520 may receive the measurements of the internal states of the subsystem from the circuits 516a-n and compute a first value of the IntVar of the system from the internal states.
  • the IntVar processor module 520 may also receive the measurements of power at the external interfaces of the subsystem from circuit 518 and use them to compute a second value of the IntVar of the system.
  • a comparator module 522 may compare the first value of the IntVar with the second value of the IntVar. Under normal operating conditions, the two values should be substantially the same. Thus, if the difference between the two values is above a threshold, controller 512 may provide an indication of the presence of a cyber attack.
  • Box 602 represents the aggregate of the measurements at the external interfaces of the subsystem. These are represented as the power exchange at the external interface £ and dE the rate of change of the power exchange at the external interface — .
  • Box 604 represents dx the internal states x and the rate of change of the internal states — of the elements of the subsystem. Under normal operating conditions, the values boxes 602 and 604 should be substantially the same. Also, the rate of change of the value of these boxes should be substantially the same.
  • the rate of change of the IntVar and/or the rate of change of the IntVar are a function of the state variables x and the rate of change of the state variables
  • a model of an element 702 is shown to illustrate example measurements of state variables and IntVar calculations for the element.
  • the element 702 is a generalized element that can represent a subsystem or an element within a subsystem.
  • the element 702 has a terminal 704. Power can be measured at the terminal, for example, by measuring the current i and voltage V.
  • positioning element “A” over element “B” can include situations in which one or more intermediate elements (e.g., element “C") is between elements “A” and elements “B” as long as the relevant characteristics and functionalities of elements “A” and “B” are not substantially changed by the intermediate element(s).
  • one or more intermediate elements e.g., element "C”
  • exemplary is means “serving as an example, instance, or illustration. Any embodiment or design described as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or designs.
  • the terms "one or more” and “at least one” indicate any integer number greater than or equal to one, i.e. one, two, three, four, etc.
  • the term “plurality” indicates any integer number greater than one.
  • the term “connection” can include an indirect “connection” and a direct “connection”.
  • references in the specification to “embodiments,” “one embodiment, “an embodiment,” “an example embodiment,” “an example,” “an instance,” “an aspect,” etc., indicate that the embodiment described can include a particular feature, structure, or characteristic, but every embodiment may or may not include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it may affect such feature, structure, or characteristic in other embodiments whether or not explicitly described.
  • Relative or positional terms including, but not limited to, the terms “upper,” “lower,” “right,” “left,” “vertical,” “horizontal, “top,” “bottom,” and derivatives of those terms relate to the described structures and methods as oriented in the drawing figures.
  • the terms “overlying,” “atop,” “on top, “positioned on” or “positioned atop” mean that a first element, such as a first structure, is present on a second element, such as a second structure, where intervening elements such as an interface structure can be present between the first element and the second element.
  • the term “direct contact” means that a first element, such as a first structure, and a second element, such as a second structure, are connected without any intermediary elements.
  • the terms “approximately” and “about” may be used to mean within ⁇ 20% of a target value in some embodiments, within ⁇ 10% of a target value in some embodiments, within ⁇ 5% of a target value in some embodiments, and yet within ⁇ 2% of a target value in some embodiments.
  • the terms “approximately” and “about” may include the target value.
  • the term “substantially equal” may be used to refer to values that are within ⁇ 20% of one another in some embodiments, within ⁇ 10% of one another in some embodiments, within ⁇ 5% of one another in some embodiments, and yet within ⁇ 2% of one another in some embodiments.
  • a first direction that is “substantially” perpendicular to a second direction may refer to a first direction that is within ⁇ 20% of making a 90° angle with the second direction in some embodiments, within ⁇ 10% of making a 90° angle with the second direction in some embodiments, within ⁇ 5% of making a 90° angle with the second direction in some embodiments, and yet within ⁇ 2% of making a 90° angle with the second direction in some embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

Des systèmes et des procédés de détection de cyberattaques de sous-systèmes comprennent une interface du sous-système qui fournit un échange d'énergie. Un processeur peut être configuré pour calculer une variable d'interaction à partir d'une fonction d'un ou de plusieurs états internes du sous-système. Un circuit comparateur est couplé pour recevoir le signal de sortie et la variable d'interaction, pour déterminer une différence entre au moins une caractéristique du signal de puissance et au moins une caractéristique de la variable d'interaction. Un module d'identification de cyberattaque est configuré pour identifier la présence d'une cyberattaque ciblant le système sur la base de la différence entre la ou les caractéristiques du signal de puissance et la ou les caractéristiques de la variable d'interaction.
PCT/US2022/038296 2021-07-26 2022-07-26 Systèmes de décision et de surveillance dynamiques cyber-sécurisés WO2023009489A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202163225873P 2021-07-26 2021-07-26
US63/225,873 2021-07-26

Publications (1)

Publication Number Publication Date
WO2023009489A1 true WO2023009489A1 (fr) 2023-02-02

Family

ID=85087200

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/038296 WO2023009489A1 (fr) 2021-07-26 2022-07-26 Systèmes de décision et de surveillance dynamiques cyber-sécurisés

Country Status (1)

Country Link
WO (1) WO2023009489A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140200722A1 (en) * 2013-01-17 2014-07-17 Eaton Corporation Method and system of anti-islanding of a microgrid in a grid-connected microgrid system
US20160329713A1 (en) * 2013-12-31 2016-11-10 Schneider Electric It Corporation Controlling a microgrid
US10362056B1 (en) * 2019-01-14 2019-07-23 The Florida International University Board Of Trustees Content-aware spoofed sensor measurement data detection in microgrids

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140200722A1 (en) * 2013-01-17 2014-07-17 Eaton Corporation Method and system of anti-islanding of a microgrid in a grid-connected microgrid system
US20160329713A1 (en) * 2013-12-31 2016-11-10 Schneider Electric It Corporation Controlling a microgrid
US10362056B1 (en) * 2019-01-14 2019-07-23 The Florida International University Board Of Trustees Content-aware spoofed sensor measurement data detection in microgrids

Similar Documents

Publication Publication Date Title
Zhou et al. Multi-microgrid energy management systems: Architecture, communication, and scheduling strategies
Ismail et al. A comprehensive review on optimal location and sizing of reactive power compensation using hybrid-based approaches for power loss reduction, voltage stability improvement, voltage profile enhancement and loadability enhancement
Hu et al. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks
Majumdar et al. Centralized volt–var optimization strategy considering malicious attack on distributed energy resources control
Zhao et al. Hierarchical control of thermostatically controlled loads for primary frequency support
Hu et al. Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with PEVs under cyber attacks
Kar et al. Distributed state estimation and energy management in smart grids: A consensus ${+} $ innovations approach
Mohsenian-Rad et al. Distributed internet-based load altering attacks against smart power grids
Parkinson et al. Comfort-constrained distributed heat pump management
Qi et al. Demand response and smart buildings: A survey of control, communication, and cyber-physical security
Keyhani et al. Automatic generation control structure for smart power grids
Wang et al. Service restoration based on AMI and networked MGs under extreme weather events
Kandasamy et al. Virtual storage capacity using demand response management to overcome intermittency of solar PV generation
Liang et al. Planning and service restoration through microgrid formation and soft open points for distribution network modernization: A review
US10424926B2 (en) Method for controlling an electric power distribution micro-grid
JP2017017779A (ja) 電力供給システムおよび電力供給方法
WO2019053941A1 (fr) Système réparti d'alimentation électrique
Huang et al. Real-time data and energy management in microgrids
Modarresi et al. New adaptive and centralised under‐voltage load shedding to prevent short‐term voltage instability
Zhang et al. Multi-objective control of residential HVAC loads for balancing the user’s comfort with the frequency regulation performance
US11404877B2 (en) Hierarchical power control system
Armendariz et al. Strategies to improve the voltage quality in active low‐voltage distribution networks using DSO's assets
Liu et al. A robust strategy for leveraging soft open points to mitigate load altering attacks
Matthiss et al. Using smart meters for distribution grid state estimation
Xie et al. On an information and control architecture for future electric energy systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22850170

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE